共 13 条
[1]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[2]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[3]
Cheng W., 2011, COMMUNICATIONS TECHN, V44, P123
[4]
Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
[5]
Knudsen L, 2010, LECT NOTES COMPUT SC, V6225, P16, DOI 10.1007/978-3-642-15031-9_2
[6]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[7]
Mangard S, 2005, LECT NOTES COMPUT SC, V3659, P157
[8]
Qu B., 2012, COMPUTERS MATH APPL
[9]
Stefan M., 2007, POWER ANAL ATTACKS R, V31
[10]
Suzuki D, 2005, LECT NOTES COMPUT SC, V3659, P366